Remove Accountability Remove Antivirus Remove Encryption Remove Information Security
article thumbnail

Akira ransomware received $42M in ransom payments from over 250 victims

Security Affairs

The Akira ransomware operators implement a double extortion model by exfiltrating victims’ data before encrypting it. Earlier versions of the ransomware were written in C++ and the malware added the.akira extension to the encrypted files. In some attacks, threat actors created an administrative account named itadm.

article thumbnail

ViperSoftX uses more sophisticated encryption and anti-analysis techniques

Security Affairs

xyz pic.twitter.com/VLhISark8Y — Goldwave (@OGoldwave) March 13, 2023 The variant employed in the campaign supports a more sophisticated encryption method of byte remapping and a monthly rotation of the C2 server. ViperSoftX also checks for active antivirus products running on the machine. c2 arrowlchat[.]com

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cactus ransomware gang claims the Schneider Electric hack

Security Affairs

Kroll researchers reported that the ransomware strain outstands for the use of encryption to protect the ransomware binary. The ransomware identifies user accounts by viewing successful logins in Windows Event Viewer, it also uses a modified variant of the open-source PSnmap Tool.

article thumbnail

Cactus ransomware gang claims the theft of 1.5TB of data from Energy management and industrial automation firm Schneider Electric

Security Affairs

[link] pic.twitter.com/z91nfnGYAQ — Dominic Alvieri (@AlvieriD) February 19, 2024 The Cactus ransomware operation has been active since March 2023, Kroll researchers reported that the ransomware strain is notable for the use of encryption to protect the ransomware binary.

article thumbnail

Info stealers and how to protect against them

Security Affairs

They may use various tactics to evade antivirus and other security measures. Some info stealers may use encryption techniques to hide their communication with command-and-control servers, making it more challenging for security systems to detect malicious activities.

Banking 119
article thumbnail

Experts spotted a variant of the Agenda Ransomware written in Rust

Security Affairs

. “The actors customized previous ransomware binaries for the intended victim through the use of confidential information such as leaked accounts and unique company IDs as the appended file extension. Upon further analysis, we have learned that these flags are used for intermittent encryption.” Pierluigi Paganini.

article thumbnail

Emsisoft: Victims of AstraLocker and Yashma ransomware can recover their files for free

Security Affairs

The security firm states that the AstraLocker decryptor works for ransomware versions based on the Babuk malware that appends the.Astra or.babyk extensions to the name of the encrypted files. “Be sure to quarantine the malware from your system first, or it may repeatedly lock your system or encrypt files.